WO2004114122A2 - Generateur de nombres securises et reseau de distribution de contenus faisant appel a ce generateur - Google Patents
Generateur de nombres securises et reseau de distribution de contenus faisant appel a ce generateur Download PDFInfo
- Publication number
- WO2004114122A2 WO2004114122A2 PCT/IB2004/050968 IB2004050968W WO2004114122A2 WO 2004114122 A2 WO2004114122 A2 WO 2004114122A2 IB 2004050968 W IB2004050968 W IB 2004050968W WO 2004114122 A2 WO2004114122 A2 WO 2004114122A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- random
- number generator
- code
- digital
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Definitions
- the present invention relates to a secure number generator, to a method for creating a unique identifier code of a solid state device, and to a content distribution system comprising at least one content source and a plurality of clients adapted to communicate with the content source or with each other or both for downloading or uploading one or more content items.
- US 5,434, 917 describes the use of the response of the metallic particles to an external magnetic or electromagnetic scanning procedure of the key card as an input to a secure public-key signature algorithm. This algorithm is located in an external device and evaluates a key code. TheOOOO key code is then written to a memory on the key card.
- the card For identification or authentication purposes, the card is inserted into a reader that scans the particle distribution using the response of the particle distribution to a magnetic field generated by the reader.
- the resulting output of the scanning procedure and identification data of the card's owner in the memory of the key card are evaluated by the reader according to a public-key algorithm and compared to the stored key code in order to ensure its validity.
- This solution has the disadvantage a card reader compatible with this system needs to be supplied with complicated and expensive scanning and evaluation facilities in order to be able to check the validity of a key card. If a key code gets compromised, the key card must be destroyed and a new card must be issued to the user.
- a PUF also called random physical function herein, is essentially a random function based on a physical quantity that is easy to evaluate, but hard to characterize.
- the evaluated physical quantity in this example is the delay time of a signal travelhng between two given points of an Integrated Circuit (IC). This delay time is influenced by gates and wires the signal has to pass. Further, this delay is known to have random variations due to variations in dies from the same wafer, and from wafer to wafer. Such variations are caused during manufacture, for instance, due to process parameters such as temperature and ambient pressure that are subject to local variations and variations in time.
- an internal measurement of the delay of electrical signals in an IC provides one value of a random function that depends, in an uncontrollable manner, on processing parameters.
- the delay value is unknown to anybody, including the manufacturer of the IC. It is not possible for the manufacturer to produce two identical ICs using this PUF. Therefore, a system integrating the PUF cannot be cloned.
- a drawback in the use of PUFs such as the one just described lies in an often- incurred instability of the physical quantity that is measured.
- the internal delay during signal propagation in an IC is depends environmental parameters at the time of the measurement. Beside parameters such as ambient temperature and pressure, e.g., also the supply voltage influences the evaluated signal delay. Therefore, a difference of the supply voltage during subsequent evaluations of the PUF will result in a different output of the random function.
- Gassend et al. provide a system that excludes an influence of instability on the key generation from the output of the PUF by introducing an additional evaluation algorithm linked to the PUF.
- the evaluation algorithm performs a division of different measured delay values, such as signal delay times along different paths, and uses the result of the division for generation of a stable key code.
- the PUF is evaluated by internal delay measurements, the ratio of the measured delay values is determined by the calculation unit, and the determined relative delay value is provided for generation of the requested key.
- a further drawback lies in the fact that the range of random numbers covered by the described PUF is rather small. Delay times on different chips of the same type he in only a small range of values due to the identical design of the integrated circuits. That implies that the random nature of the key codes provided is hard to control.
- a secure number generator comprising a random function unit and a non-volatile memory connected to said random function unit, wherein the random function unit implements an unstable, measurable random quantity, such that a repeated measurement of the random quantity results in different random values, and wherein the random function unit is adapted to measure a current random value of the random quantity, to transform the current random value into a digital random code, and to write said digital random code to a first section of said non-volatile memory.
- the secure number generator of the present invention has a random function unit that implements an unstable measurable random quantity.
- the instability of the random quantity is such that a repeated measurement of the random quantity results in different random values. In other words, the result of a measurement of the random quantity is not reproducible when the measurement is repeated.
- An example of such a random quantity is the signal delay in an integrated circuit as described earlier. It is important that in this example according to the invention the random quantity must be unstable. That means, in contrast to Gassend et al. there is no control instance that cancels out the instability of the random quantity. Further examples of such random quantities will be presented below in the context of the description of preferred embodiments.
- the random function unit of the secure number generator of the invention provides at its output a digital random code as the result of a transformation of the measured random value of the random quantity.
- the transformation is such that the digital random code provided by the random function preserves the irreproducible nature of the measured random value. Given a sufficient code length the binary random code can easily made globally unique without control by any external instance.
- the random function unit is adapted to provide a digital random code that is simply the binary translation of the measured random value.
- Other types of transformation of the measured random value into a digital random code are considered equally useful.
- the transformation should be as simple as possible in order to save space when implementing the transformation algorithm on chip, without, of course, destroying the random nature of the digital code and the irreproducibility of the random code.
- the secure number generator of the present invention delivers a reproducible random code because dedicated circuitry is provided that determines a constant random value in the form of a signal delay ratio, before creating the binary code.
- the random function unit is adapted to write the digital random code to a first section of a non-volatile memory.
- the non-volatile memory is stable and persistent.
- a preferred example is an MRAM register.
- the memory is a part of the secure number generator. There is only an internal writing access to the memory. The memory is in a preferred embodiment protected against external attacks by an integrity control unit integrated into the secure number generator.
- the integrity control unit is adapted to check if any one of the bits stored in the non-volatile memory has been changed.
- the integrity control unit comprises a write controller and a read controller for the non- volatile memory.
- the write controller is adapted to generate from the digital random code provided by the random function unit output data that comprises the digital random code and at least one checking bit allocated to at least one code bit of the digital random code.
- the respective checking bit(s) has (have) a value that is complementary to that of the respective code bit(s).
- a checking bit is stored in a storage cell allocated to the storage cell storing the respective allocated code bit, preferably in a neighboring storage cell. This way, the read controller of the secure number generator can detect tampering attempts to the memory.
- the read controller compares the values of a respective code bit checking bit pair. If the values are not complementary, i.e., if they are identical, either the code bit or the checking bit must have been changed. That implies the integrity of the random code stored in the non-volatile memory is lost.
- the digital random code can then be renewed internally, for instance by triggering the random function unit to create a new random code with a corresponding control signal that is provided by the read control unit.
- the secure number generator has several advantages of over prior art devices.
- the use of a random function unit with an unstable random quantity saves space in an integrated circuit.
- the prior art solution of Gassend et al. shows that stability requires additional circuitry, which costs space.
- the stability of the binary random code is guaranteed in the secure number generator of the invention by storing the number in a non-volatile memory such as NVRAM.
- the binary code provided by the secure number generator is therefore not dependent on temperature or noise as in a solution where the random quantity must be evaluated every time the binary code is requested.
- it is easy to check the secure number generator of the present invention on the correctness of the . implementation of the random quantity This can be done by simply performing repeated measurements of the quantity and verifying the random nature of the provided output.
- the manufacturer of the secure number generator has no influence on the number.
- the manufacturer of a chip comprising the secure number generator of the invention need not even participate in the activation of the secure number. Therefore, with the secure number generator of the invention there is no possibility to clone the generated secure number .
- a key may become compromised.
- Most prior art systems revoke the whole device in this case because they cannot securely renew the keys.
- the present invention allows securely renewing a key without revocation of the device holding it.
- the fact that the random function unit does not generate the same binary random code twice implies that the binary random code stored in the memory can be reinitialised simply by letting the random function unit provide a new binary random code.
- the renewal of the key can only be performed internally upon reception of a reset signal from outside, as will be described below in the context of a preferred embodiment. This allows a revocation authority to renew the key if necessary in a very secure way compared to known key renewal methods.
- measures are taken that the random function can only be read once, for instance during manufacture, or first use of a solid-state device comprising the secure number generator.
- measures can comprise a hardware or software control of the secure number generator.
- the electrical connection between the random function unit and the non-volatile memory can be destroyed after storing the random digital code to the memory.
- a control feature can be added that implements a "write-once" access to the memory.
- a preferred embodiment of the secure number generator of the invention comprises a control unit connected with the random function unit.
- the control unit is adapted to trigger the random function unit to ascertain and write a new digital random code to the memory.
- the control unit may further be adapted to provide this signal under certain predetermined conditions.
- One example of such a condition is the first detection of a reception of a read request asking for an output of the digital random code from the first section of the memory to an external client.
- Another example of such a condition is the reception of a signal indicating detection of a loss of integrity of the digital random code.
- a loss of integrity is for instance a change of one or several bits of the code.
- the control unit receives this signal from an integrity control adapted to unit that is preferably integrated into the secure number generator.
- the secure number generator is adapted to receive from an external source a signal indicating that the memory shall be initialised or rewritten with a new random code.
- an external source can be a unit that is provided on the same chip, for instance a timing unit that detects and signals that die time of validity of the previously stored code has run out.
- An external source may also be an external device adapted to create the signal and provide it to the secure number generator through an electrical contact on the chip comprising the secure number generator.
- an operator of a smartcard system may send a reset command to a set-top box that is used to read the card.
- the set-top box will then reset the card.
- Another example is a user interface of a device holding the secure number generator that allows the user to enter a command to reset the secure number.
- a further embodiment of the secure number generator has a second section in the memory separate from the first section.
- the second section can be used for storing manufacturer identification.
- the memory has an input connected with said second section and not said first section. This way, it can be assured that the manufacturer is not able to overwrite the binary random code stored in the first section.
- the implementation of the connection between the input and only the second section of the memory can be physical, e.g., by circuit paths connecting the input only with the second section.
- This embodiment requires two inputs to the memory, one for the random code, one for external identification data.
- the present embodiment may take the form of two separate memory registers integrated into the secure number generator.
- the non- volatile memory is preferably an MRAM register.
- MRAM memory technology provides a stable, temperature-resistant memory.
- the secure number generator contains a random function.
- a possible candidate for a random function to be used with the secure number generator of the invention is any random function that implements an unstable, measurable random quantity, such that a repeated measurement of the random quantity results in different random values.
- the most important feature of the random function used with the secure number generator of the invention is that the number created is not predictable.
- the random function is in alternative embodiments deterministic or non-deterministic.
- Four examples of a suitable random function are given in the following: a) A maximum length sequence (MLS) coupled to a free-ranning ring-oscillator. Maximum length-sequences are well known in the art. For instance, an MLS can be implemented using a shift register with exclusive-OR feedback from more than two taps of the register.
- a MLS alone provides a pseudo-random sequence of bits that is repeated after a predetermined number of bits, depending on the length of the shift register.
- a highly unpredictable binary value can be generated by reading the bit-sequence of the MLS after an unpredictable number of clock ticks. For instance this can be done by connecting the shift clock input of the MLS to a free running ring oscillator of poorly predictable frequency, and reading the MLS value after a period that is determined by some independent other means, e.g. a fixed system time interval.
- a non-linear electrical circuit exhibiting chaotic behaviour It is well known in the art that non-linear circuits can be designed to exhibit chaotic behaviour in an output signal.
- a diode may be the source of a chaotic behaviour in a non-linear circuit.
- An electrical circuit reading physical noise such as the thermal noise generated by thermal agitation of electrons in a conductor, background noise in the radio static electromagnetic spectrum
- Another example of a random function implementing a suitable physical quantity is an array of MRAM cells that have an uncertain cell state. Below a certain cell size an MRAM cell does not take on a defined cell state. A measurement of the cell state results in a value that varies randomly from measurement to measurement. Therefore, each cell of the array will provide a random bit resulting in a random bit sequence that is obtained when reading from the whole MRAM array.
- the secure number generator can be used in any application, which makes use of secure random numbers, such as in an encryption device, in a random number generator that provides third parties with random numbers for their particular purposes, such as a lottery, etc.
- the secure number generator of the invention is preferably integrated into an IC.
- a second aspect of the invention concerns a method for creating a unique key allocated to a solid-state device, comprising the steps of providing a solid state device comprising an implementation of an unstable, measurable random quantity, such that a repeated measurement of the random quantity results in different random values, measuring a current random value of the random quantity, transforming the current random value into a digital random code, and writing said digital random code to a first section of a non-volatile memory that is integrated into the solid-state device, wherein the solid-state device performs the measuring, transforming and writing steps.
- the method of this aspect of the invention provides a secure way of creating an identifier for a solid-state device, which can be an IC, or any device comprising the IC.
- a solid-state device which can be an IC, or any device comprising the IC.
- the advantages of the method are the same as those described for the secure number generator of the first aspect of the invention.
- the key may be used as an identifier of the solid-state device, or for encrypting data exported or written by the solid-state device to a memory, or for both.
- Different preferred embodiments of the method of the invention comprise performing the method during manufacture of the solid-state device or during first use of the . device. The method may also be performed after the first use of the device, for instance, at the time when the solid-state device is required to provide or use the key for the first time.
- Other preferred embodiments of the method of the invention correspond to the additional features of the preferred embodiments of the secure number generator of the first aspect of the invention.
- One embodiment comprises triggering the random function unit to ascertain and write a new digital random code to said memory.
- Another embodiment comprises receiving a signal from an external source indicating that the memory shall be rewritten with a new digital random code.
- a further embodiment comprises programming a second section of the memory with a second digital code.
- the present invention can be used in the field of digital rights management (DRM) in connection with content distribution over data networks.
- DRM digital rights management
- Most known DRM systems use a multitude of identifiers to track the nature and origin of content items and to describe and classify it. Some of the identifiers are embedded into the content item or the multiplex containing the content, some are only associated with the content item.
- the identifiers used currently are embedded by central instances such as an original source of the content, and many instances of content items with identical identifiers exist. These identifiers cannot be used to pin point specific hardware that may be compromised. Pin pointing offending hardware would be useful if it becomes possible to revoke specific hardware as proposed for emerging DRM systems.
- Current systems do not provide for a means to securely add tags locally to signify the state of the content item or of the local source.
- the invention concerns a content distribution network, comprising at least one content source and a plurality of clients.
- the clients and the content server are adapted to communicate with each other for downloading or uploading one or more content items.
- the content source comprises a plurality of content items having content data.
- the content source and at least one content client are provided with a secure number generator according to the first aspect of the invention.
- the content source and at least one content client is adapted to add a digital random code stored in its respective secure number generator to a copy of the content item during or after downloading, before or during uploading, or during or after manipulating the content data of the copy of the content item.
- the present aspect of the invention proposes to enable the secure adding of certain identifiers in the form of a digital random code by the device or application that imports (i.e., downloads), exports (i.e., uploads) or manipulates content data of a content item.
- import and download are used with the same meaning herein.
- export or upload are used herein with the same meaning.
- a client imports or downloads a copy of a content item from a content source.
- the terms download and upload shall not imply a determination of who initiates the data transmission.
- the client or the content source may initiate downloading.
- the initiation of an download process by a client is a request form well known from Internet usage. Initiation of an download by the content source is known from software update procedures, for instance within corporate content distribution networks. Also uploading content items may be initiated by either the content source or the client.
- a content item provided by a content source need not be the original. It can be a copy of an original, or a second copy, and so on.
- One of the main advantages of the content distribution network of the invention is that it allows tracking the history of the individual copy. If the content item is a copy of an original item, it contains at least one identifier of the hardware the data has been imported from, and an identifier of the content source where it is presently stored. It is therefore possible to track the content history. Based an that history the original content provider may not only track illegal use, but also award benefits to the owners or users and distributors of the featured ID's.
- a further advantage of the proposed content distribution network is that the content data carry information about nature and state of source device, medium or DRM. If for instance a copy of an original is allowed but a copy of a copy not then embedding a source identifier could provide a receiving device with information about the legality of making a copy.
- the invention comprises adding the identifier during or after downloading.
- the content source can add its identifier to a copy of a content item only before or during uploading the copy.
- Manipulating content data in the sense of the invention is any change of the content data, except for adding the random digital key stored in the secure number generator to the content data.
- Manipulating includes for instance rendering, encryption, or compression of at least a part of the content data.
- the content distribution network of the present invention has at least one content source.
- the content source is in one embodiment a server connected to a database.
- the database comprises content items.
- a content item in the context of the present invention is a data file comprising coded information that can be reproduced for instance using an optical or acoustical reproduction technique or by a combination of optical and acoustical reproduction techniques.
- Typical examples of content items are data files encoding sound, music, a movie, a text document, a picture, a game, etc. or comprising an executable file, or a combination of the aforementioned.
- the content source of this embodiment is adapted to receive requests for transmission of one or several content items from clients comprised by the content distribution network and to transmit the content items to the requesting client, or another client, or to a number of clients at the same time, depending on the destination address for the content item given in the request.
- Content items are in one embodiment of the content distribution network of the invention provided by more than one content source.
- a client may be a content source at the same time, and vice versa.
- a client and a content source are preferably implemented by respective software modules that may or may not be based on known applications such as an FTP server/client or an Internet browser. The functionality of downloading or uploading or manipulating a content item is known from many applications.
- the feature of adding a secure identifier stored in the non-volatile memory of the secure number generator to a copy of a content item during or after downloading, before or during uploading, or during or after manipulating the content data of the copy of the content item is in one embodiment implemented as an additional software module extending the functionalities of one or more preexisting applications.
- a hardware comprising both a client and a content source implementation is adapted to play both roles.
- a certain solid-state device can take only one role within the content distribution network, either content source or client.
- the clients take the form of solid state devices like an MP3 player, a personal digital assistant, a mobile phone, a computer, a CD or DVD player and/or burner, a digital video recorder, and the like.
- Communication between content source and client can be established by any known communication technique, cable-bound or wireless, optical or electrical, also by transportation of storage media storing a content item.
- a DRM unit communicating with the content source or the content client or both and adapted to allocate rights to perform defined actions with an individual copy of a content item to an individual hardware.
- a right can take the form of a string that encodes authorized uses for a content item. For instance a right may indicate that a certain song only plays if the medium storing the song is in a player with a specified identification number.
- the possible roles a hardware may play are in a further embodiment controlled, preferably by a digital rights management unit connected to the content distribution network.
- the DRM unit allocates rights to individual solid-state devices comprised by the content distribution network. This may take the form of providing a combined client and content source implementation on a solid state device with the information that performing the content source implementation on the solid state device is prohibited, preferably with means in addition for prohibiting an attempt to perform the content source implementation.
- every content source and every client of the content distribution network of the invention is provided with a secure number generator of the invention.
- tracking the distribution means that a content provider is able to read the distribution history of an individual copy of a content item from the content data.
- a content provider is, e.g., a publisher of the content, such as a record company. Every time a client imports an individual copy of a content item content item, the content data is extended with a secure identifier. This way it is possible to pin point a device that provided an illegal copy of a content item. As a consequence, the secure number of the device may be revoked by the DRM unit, which will prohibit the further distribution of the copy from that hardware.
- not all clients have a secure number generator. For instance, it may be considered unnecessary to provide trusted clients such as clients under immediate control of a content provider with the embedding feature.
- the content source or the client or both are adapted to add to the digital random code at least one second digital code containing the following information item: that a content item has been imported or a device type of the importing client or a device type of the content source a type of an application or server implemented on the client or the content source an authorised type of use of the content item allocated to the client or an identifier of the content source or the client the content has been uploaded from or a combination of the previous information items.
- the device type is, e.g., a disc type, a Sapphire-comphant CE player, a Digital
- DMX Media X
- Including the device can be relevant if there are rules for manipulation of content items that restrict the right for manipulation to certain device types.
- Information items specifying authorised usage are, e.g., an information element indicating an authorisation of a specific client to render the content data, and an information element indicating an authorisation to only read the content data.
- the content source or the content clients or both are adapted to add the digital random code by performing at least one of the following steps: - watermarking the content item with the digital random code storing the identifier to a predefined location inside a multiplex conta ⁇ iing the content storing the identifier in a header or a tail of a file containing the content storing the identifier in a separate file allocated to the content, such as in an (optionally encrypted) rights string as stored by the DRM unit.
- a combination of the previous is for instance embedding the identifier (or a set of identifiers or additional coded information items) in a file header, tail or a separate file and embedding a message digest type of signature (hash) in the content stream with a watermark.
- a receiving application will know from the content stream that more information should be present and, if present, can check the validity of the information present.
- Another example of a combination is to embed a strong watermark indicating the presence of identifiers on another location. This way the disadvantage that watermarking cannot be used to accumulate a number of IDs in a content item can be avoided while using the advantages of watermarking in combination with hardware tracking according to the invention.
- the payload mark can be a fragile watermark as manipulations that invalidate the information in the watermark are always unauthorised manipulations.
- the content may be in compressed form, be it in as a part of a multiplex or not.
- the content source or the content clients or both are adapted to encrypt the content data using their respective digital random code.
- the predefined location inside the multiplex can be encrypted (for protection) or not (to ensure accessibility).
- the content distribution system of the invention comprises in one embodiment a revocation authority adapted to communicate with the clients and to communicate a revocation to a specific client, wherein the clients are adapted to trigger their respective secure number generator to create a new digital random code upon receiving the revocation.
- the revocation authority is preferably the DRM unit mentioned earlier.
- the communication of the revocation may take the form of a predefined signal, a revocation file.
- the hardware of the device containing the secure number generator may be revoked by a corresponding predefined communication, e.g., a revocation file or signal. Reception of this communication triggers the erasure of the secure number registers and a shut down of the secure number generator, or of the device holding the secure number generator.
- Fig. 1 is a simplified block diagram showing a preferred embodiment of the secure number generator of the invention.
- Fig. 2 is a flow diagram showing a preferred embodiment of the method of the invention
- Fig. 3 is a schematic diagram showing a content distribution network of the invention
- Fig. 4 shows the structure of a database of the content distribution network of the invention and the content items stored therein.
- Fig. 1 is a simplified block diagram showing a preferred embodiment of the secure number generator 10.
- the secure number generator has a random function unit 12 comprising a random circuit 14. Random circuit 14 implements a non-linear electrical circuit exhibiting chaotic behaviour. The output of random circuit 14 is connected to a random function controller 16 also comprised by random function unit 12. Random function controller 16 is connected with a first MRAM register 18. The secure number generator further has a second MRAM register 20 connected with a control unit 22. Control unit 22 has an interface for receiving control data and user data from external sources and for providing the code stored in MRAM registers 18 and 20 as an output, as indicated in Fig. 1 by a single - lined arrow (control data) and a double-lined arrow (user data).
- User data can only be forwarded to MRAM register 20. There is no connection between control unit 22 and MRAM register 18 that allows a write operation of the user data received from an external source. This ensures that the MRAM register 18 cannot be overwritten with a code other than a new random code generated by random function unit 12.
- the secure number generator 10 is a circuit module (IP) that can be implemented in connection with other modules in an integrated circuit (IC). All other modules of such an IC are external sources of signal or user data.
- the operation of the random circuit 14 is triggered by a control signal provided by control unit 22.
- Control unit 22 sends an initial trigger signal to random circuit 14 when power is supplied to the random generator 10 for the first time. Later on, control unit 14 triggers the random circuit whenever the latter receives a control message from an external source indicating that a new random code is to be generated.
- random circuit 14 Upon reception of a trigger signal random circuit 14 provides a voltage value of the electrical circuit that exhibits chaotic behaviour at its output.
- Random function controller 16 reads the voltage value and transforms it into a digital random code. Depending on the desired length of the digital random code, these steps are repeated until the predefined number of random code bits has been determined.
- the generated digital random code is written to MRAM register 18.
- MRAM register 20 can for instance be used to extend the digital random code in first MRAM register 18 by an identifier specifying, e.g., the manufacturer of the IC containing the secure number generator.
- the combination of the codes in MRAM registers 18 and 20 forms a globally unique secure identifier, if, of course, a large enough length of the digital random code in MRAM register 18 is chosen.
- MRAM register 20 holds a globally unique number already. Then the code length of the secure number in MRAM register 18 is not an issue for the uniqueness of the complete number.
- the secure number generator is in an alternative embodiment extended to generate and store several different digital random codes.
- the MRAM register 18 has a corresponding number of memory cells. Controller 16 is adapted to manage the allocation of different memory sections of MRAM register 18 to the different identifiers and to write a specified identifier to a corresponding section. In addition, the control unit 22 is adapted to manage requests to read or to renew a specific identifier. This embodiment is useful for instance in a content distribution system which prescribes a content client to use of different identifiers for downloading and uploading content items.
- Another alternative embodiment has a basic random code in MRAM register 18 and several code annexes indicating different content uses in different sections of MRAM register 20.
- a combination of the basic random code with a specific annex is provided as the output by control unit 22, given a corresponding content use.
- Fig. 2 shows a flow diagram of an embodiment of the method of the invention.
- a step S10 a current random value of an unstable physical random quantity is measured.
- the measured value is transformed into a digital random code.
- an analog-digital converter can be used to perform step S12.
- the measured value forms the analog input
- the digital random code forms the output.
- the digital random code is written to an MRAM register.
- an MRAM register is mentioned here as an example. Any other type of non-volatile memory is equally suitable.
- the present embodiment of the method has a step S16 of watching for a trigger signal to restart code generation. If such a trigger signal is received, code generation is started again with step S10.
- Fig. 3 is a schematic diagram showing an embodiment of a content distribution network according to the invention.
- the content distribution network comprises content servers forming content sources.
- Content servers are represented in Fig. 3 by boxes with double outlines, such as the content server 32.
- Content server 32 is connected with a database 34 that stores content items. Examples of content servers are an internet server or a retail stop based jukebox.
- the content distribution network also comprises clients.
- Clients are represented by boxes with single outlines, such as clients 36 through 46.
- Client 46 is connected with a local database 48.
- server/client device 50 with a database 52.
- An oval shape 54 represents the communication network through which the data exchange between content servers and clients takes place. Lines connecting the individual boxes with the oval shape 54 indicate connection of the individual clients and servers through the communication network 54.
- Communication through network 54 may be performed using packet switching or circuit switching.
- a direct link between a content server and a client can be established, for instance using a local network connection. This is indicated by the direct connection between content server 32 and client 36.
- Content clients 42 and 44 are connected with the network through a local content proxy server 46.
- the local proxy server 46 takes the role of a client in communication with other content servers such as content server 32. In communication with local clients 42 and 44 it is a content server.
- a local content proxy server is useful for instance in larger companies working in the field of content rendering.
- the clients 42 and 44 may in that example represent workstations implementing content rendering software.
- a wireless communication link is used between client 40 and a base station 56 of a wireless communication network, indicated by the antennas 58 and 60 and the dashed line between client 40 and base station 56.
- All content servers, databases, and clients in content distribution network 30 have a secure number generator. This is indicated by small boxes with reference numbers SNG 1 through SNG 13.
- SNG 1 through SNG 13 As a first example of operation of the content distribution network 30 consider client 40.
- client 40 is a single chip MRAM based MP3 player.
- SNG10 has an embedded unique identifier, referred to as identifier A in the following.
- Server 32 is a retail stop based jukebox having an identifier B.
- Jukebox 32 Before the MP3 player 40 downloads content from jukebox 32 it sends identifier A through a secure authenticated communication channel provided by communication network 54 and the wireless network provider MP3 player has subscribed to. Jukebox 32 maintains a "black list" of identifiers that have been revoked. A reason for revocation of an identifier is for instance an illegal distribution of a content item by the corresponding device.
- the jukebox If the content dispenser, the jukebox, ascertains that identifier A is not on his black list it embeds identifier A into the audio data stream that is downloaded as a requested content item to the MP3 player 40. For embedding the identifier using watermarking is used. As an option the identifier of jukebox 32 can also be implemented, with an additional annex indicating that the content item was downloaded from jukebox 32.
- the jukebox determines that identifier A is compromised it will not transmit the requested content item. Instead, it will invoke revocation of the identifier A.
- a revocation procedure provided by a DRM system or DRM enabeling technology is used, for instance the secure digital storage standard Sapphire.
- client/server 50 is a CE player, i.e. a pocket player based on the operation system "Windows CE”. It is adapted to redistribute downloaded content items.
- the present example differs from the last in the following features: If CE player 50 downloads a content item from content server 32, attached to the multiplex containing the compressed audio data there is a table of identifiers encrypted in the same key as the content. Each record in the table has two fields. The first field specifies the type of identifier, the second the identifier itself. A robust watermark in the audio stream indicates that the identifer table must be present. The original provider of the content has written its own identifier in the first record of the table.
- the original recipient 50 writes its ID in the second record.
- it may also write a source type ID (disc), a device type ID (CE player) in the following records. If each subsequent device that handles the file writes its identification in the file than a history of the copy of the content item is compiled. Based an that history the original content provider may award benefits to the owners of the featured ID's. This can be accomplished using a transaction server (not shown) that is contacted for activation of content or for paying for the content. The transaction server may retrieve the history and dispense credits based on it.
- Fig. 4 shows schematically the structure of files contained in a storage medium 60 of a content source or a client.
- the storage medium 60 contains content files 62, 64, and 66.
- the structure of content file 66 when transmitted in a content stream is shown below the block representing storage medium 60.
- the content stream has a stream header 70, a number of data packets, and a stream tail 78. Only the first data packet 72, the last data packet 74 and an intermediate data packet 76 of the content stream are given reference numbers.
- the intermediate data packet 76 is chosen as an example to show the data structure of a data packet.
- a packet has a packet header 80, content data section 82, and a packet tail 84.
- the stream header 70, the stream tail 78, the packet headers 80 and the packet tails provide space for storing identifiers.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computational Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Storage Device Security (AREA)
Abstract
Générateur de nombres sécurisés (10, SNG 1... 10), comportant un module à fonction aléatoire (12) et une mémoire rémanente (18, 20) connectée audit module. Ce dernier met en oeuvre une quantité aléatoire, mesurable et instable (14), de sorte qu'une mesure répétée de ladite quantité aléatoire donne différentes valeurs aléatoires. Le module à fonction aléatoire (12) est conçu pour identifier une valeur aléatoire courante de ladite quantité aléatoire (14), transformer la valeur aléatoire courante en un code aléatoire numérique et inscrire ce code dans une première zone (18) de la mémoire rémanente. Un réseau de distribution de contenus faisant appel à ce générateur de nombres sécurisés est également décrit.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03101903 | 2003-06-26 | ||
EP03101903.7 | 2003-06-26 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2004114122A2 true WO2004114122A2 (fr) | 2004-12-29 |
WO2004114122A3 WO2004114122A3 (fr) | 2006-04-06 |
Family
ID=33522420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/050968 WO2004114122A2 (fr) | 2003-06-26 | 2004-06-22 | Generateur de nombres securises et reseau de distribution de contenus faisant appel a ce generateur |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2004114122A2 (fr) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7564345B2 (en) | 2004-11-12 | 2009-07-21 | Verayo, Inc. | Volatile device keys and applications thereof |
US8630410B2 (en) | 2006-01-24 | 2014-01-14 | Verayo, Inc. | Signal generator based device security |
US8782396B2 (en) | 2007-09-19 | 2014-07-15 | Verayo, Inc. | Authentication with physical unclonable functions |
WO2015035037A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction physiquement non reproductible basée sur la tension de claquage d'un dispositif métal/isolant/métal |
WO2015035043A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction physiquement non clonable basée sur l'état logique initial d'une mémoire vive magnétique |
WO2015035049A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction physiquement non clonable basée sur l'état logique aléatoire d'une mémoire vive magnétorésistante |
WO2015035053A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction inclonable physiquement basée sur la résistivité de jonctions tunnel magnétiques d'une mémoire vive magnétorésistive |
WO2015035033A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction inclonable physiquement basée sur une tension de programmation d'une mémoire vive magnétorésistive |
CN110888910A (zh) * | 2018-09-11 | 2020-03-17 | 北京京东尚科信息技术有限公司 | 唯一识别码的号段切换方法和装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6161213A (en) * | 1999-02-17 | 2000-12-12 | Icid, Llc | System for providing an integrated circuit with a unique identification |
WO2002045139A1 (fr) * | 2000-12-01 | 2002-06-06 | Hitachi, Ltd | Methode d'identification d'un dispositif a circuit integre a semi-conducteur, procede de fabrication d'un tel dispositif, dispositif a circuit integre a semi-conducteur et microcircuit a semi-conducteur |
-
2004
- 2004-06-22 WO PCT/IB2004/050968 patent/WO2004114122A2/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6161213A (en) * | 1999-02-17 | 2000-12-12 | Icid, Llc | System for providing an integrated circuit with a unique identification |
WO2002045139A1 (fr) * | 2000-12-01 | 2002-06-06 | Hitachi, Ltd | Methode d'identification d'un dispositif a circuit integre a semi-conducteur, procede de fabrication d'un tel dispositif, dispositif a circuit integre a semi-conducteur et microcircuit a semi-conducteur |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7564345B2 (en) | 2004-11-12 | 2009-07-21 | Verayo, Inc. | Volatile device keys and applications thereof |
US7702927B2 (en) | 2004-11-12 | 2010-04-20 | Verayo, Inc. | Securely field configurable device |
US7839278B2 (en) | 2004-11-12 | 2010-11-23 | Verayo, Inc. | Volatile device keys and applications thereof |
US8756438B2 (en) | 2004-11-12 | 2014-06-17 | Verayo, Inc. | Securely field configurable device |
US8630410B2 (en) | 2006-01-24 | 2014-01-14 | Verayo, Inc. | Signal generator based device security |
US8782396B2 (en) | 2007-09-19 | 2014-07-15 | Verayo, Inc. | Authentication with physical unclonable functions |
WO2015035049A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction physiquement non clonable basée sur l'état logique aléatoire d'une mémoire vive magnétorésistante |
WO2015035043A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction physiquement non clonable basée sur l'état logique initial d'une mémoire vive magnétique |
WO2015035037A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction physiquement non reproductible basée sur la tension de claquage d'un dispositif métal/isolant/métal |
WO2015035053A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction inclonable physiquement basée sur la résistivité de jonctions tunnel magnétiques d'une mémoire vive magnétorésistive |
WO2015035033A1 (fr) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Fonction inclonable physiquement basée sur une tension de programmation d'une mémoire vive magnétorésistive |
US9214214B2 (en) | 2013-09-09 | 2015-12-15 | Qualcomm Incorporated | Physically unclonable function based on the random logical state of magnetoresistive random-access memory |
US9230630B2 (en) | 2013-09-09 | 2016-01-05 | Qualcomm Incorporated | Physically unclonable function based on the initial logical state of magnetoresistive random-access memory |
US9298946B2 (en) | 2013-09-09 | 2016-03-29 | Qualcomm Incorporated | Physically unclonable function based on breakdown voltage of metal-insulator-metal device |
CN105518787A (zh) * | 2013-09-09 | 2016-04-20 | 高通股份有限公司 | 基于磁阻式随机存取存储器的编程电压的物理不可克隆函数 |
US9343135B2 (en) | 2013-09-09 | 2016-05-17 | Qualcomm Incorporated | Physically unclonable function based on programming voltage of magnetoresistive random-access memory |
CN110888910A (zh) * | 2018-09-11 | 2020-03-17 | 北京京东尚科信息技术有限公司 | 唯一识别码的号段切换方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
WO2004114122A3 (fr) | 2006-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6950941B1 (en) | Copy protection system for portable storage media | |
US10038686B2 (en) | Hybrid device and person based authorization domain architecture | |
US6550011B1 (en) | Media content protection utilizing public key cryptography | |
CN100414865C (zh) | 发送内容数据的方法和装置,及记录和/或还原装置 | |
US7376624B2 (en) | Secure communication and real-time watermarking using mutating identifiers | |
KR101043336B1 (ko) | 디바이스와 휴대형 저장장치간의 디지털 권리객체에 관한정보의 획득 및 제거를 위한 방법 및 장치 | |
US7124304B2 (en) | Receiving device for securely storing a content item, and playback device | |
US20030016829A1 (en) | System and method for protecting content data | |
US20060149683A1 (en) | User terminal for receiving license | |
RU2395166C2 (ru) | Способ предоставления доступа к зашифрованному контенту одной из множества абонентских систем, устройство для предоставления доступа к зашифрованному контенту и способ формирования пакетов защищенного контента | |
US20060021065A1 (en) | Method and device for authorizing content operations | |
MX2007014237A (es) | Implementacion de almacenamiento seguro con integridad protegida. | |
CN101651714B (zh) | 下载方法及相关系统和设备 | |
WO2003088056A1 (fr) | Dispositif de traitement d'information, procede et programme correspondants | |
JP2007510975A (ja) | デジタル著作権管理システムのためのデジタル著作権管理ユニット | |
KR100982515B1 (ko) | 해시 체인을 이용하여 디지털 컨텐츠의 접근 횟수를제한하는 장치 및 방법 | |
CN101578608B (zh) | 用于基于会话票证存取内容的方法及设备 | |
US7617402B2 (en) | Copyright protection system, encryption device, decryption device and recording medium | |
US20050138400A1 (en) | Digital content protection method | |
JP2007124717A (ja) | デジタルコンテンツ無断複製防止システム | |
WO2004114122A2 (fr) | Generateur de nombres securises et reseau de distribution de contenus faisant appel a ce generateur | |
JP2008033512A (ja) | セキュリティチップ及びプラットフォーム | |
KR20050121739A (ko) | 디지털 권리를 관리하는 방법 및 시스템 | |
CN100433030C (zh) | 数字数据文件加密装置和方法 | |
NZ545669A (en) | Portable storage device and method of managing files in the portable storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |